By
Bob Tinker
CEO @ BlueRock Security

BlueRock Delivers Runtime Reachability Intelligence (RRIQ) That Saves Developers Time

Published On
September 4, 2025
<div id="aws-cta-banner"> <div class="cta"> <div class="cta-title">BlueRock on AWS Marketplace:</div> <div class="cta-text"> Reduce patch firedrills and secure workloads out-of-the-box with runtime reachability and real-time protection. Free access to BlueRock Compute Firewall AMIs now available for EC2 and EKS. </div> </div> <div class="cta-actions"> <div class="cta-close" onclick="document.getElementById('aws-cta-banner').remove()">×</div> <a href="https://www.bluerock.io/aws-signup?utm_source=blog&utm_medium=article&utm_campaign=aws-launch&utm_content=get-free" class="cta-link" target="_blank"> Get Free Access </a> <a href="https://www.bluerock.io/aws-signup?utm_source=blog&utm_medium=article&utm_campaign=aws-launch&utm_content=demo" class="cta-link" style="background: #444;"> Request a Demo </a> </div> </div>
BlueRock RRIQ Is Now Available On AWS Marketplace For Amazon Linux 2023, and soon for Ubuntu.

It’s about time.  It’s about time that developers had more time to innovate and less time wasted on an endless queue of vuln patch firedrills.  It’s about time your cloud apps, containers and nodes were secure by default, with runtime visibility that sees exactly what runs to help prioritize patching, and with runtime security that’s as fast as it is transparent, eliminating the need to “bolt on” legacy security agents.

BlueRock has released its breakthrough compute firewall for AWS, pre-integrated into the cloud-ready Linux and Container node images you love - Amazon Linux 2023, and soon Ubuntu.

With BlueRock, developers’ Day-1 value is breakthrough Runtime Reachability Intelligence (RRIQ) that drastically slashes how much time developers need to spend on vulnerability patching.  The result?  Development teams get back multiple days per sprint to focus more time on innovation and less time on patch fire drills.  How does it accomplish this?  Unlike traditional SCA, SAST and DAST tools that only scan static manifests and files on disk or test apps from the outside, BlueRock RRIQ has a unique vantage point, observing the application as it runs throughout your CI/CD pipeline.  BlueRock sees what libraries and code paths actually run, mapping what runs to the CVEs that matter most to fix.  This inverts the model, delivering a bottoms-up, evidence-based view of your true attack surface and highest-priority CVEs.

Day-2 value is the BlueRock Compute Firewall which provides agent-less monitoring and real-time attack prevention.  AI used by attackers has reduced the gap between vulnerability and exploit from weeks to days to hours.  BlueRock Runtime Execution Guardrails (RXG) provide CVE-agnostic protection against known and unknown threats targeting Java and Python applications, containers and nodes,  Simple invariant-based guardrails effectively alert or block entire classes of malicious exploit chains.  Just 5 simple policies prevent exploit-chains for 70% of CISA’s documented Known Exploited Vulnerabilities (KEVs).

Yep. It’s about time that runtime security was built for developers.  LESS work.  MORE time.  BETTER security. 

Now available on AWS Marketplace, the BlueRock Security Amazon Linux 2023 EC2 image delivers:

  • Visibility into which libraries and code paths actually run in your cloud/app environments.
  • Reduction in your vulnerability patch list by 70 - 90%, saving time spent on false positive vulnerabilities on a continual basis. 
  • Evidence-based reachability reports that align dev and security on what to fix first.
  • Runtime protection for apps, containers and nodes, without legacy “bolt on” agents.
  • Java and Python App runtime guardrails to detect and block against Java and Python deserialization, path traversal, and other package and framework vulnerabilities.
  • Container and node protections that can alert and block entire classes of attack chains, including remote code execution, malware installation, container image drift, vertical and lateral escapes, rootkit installation, and remote shell command and control. 
  • Streamlined runtime protection policies.  5 simple policies protect 70% of CISA’s documented Known Exploitable Vulnerabilities (KEVs).
  • Frictionless integration into CI/CD workflows, requiring no code changes by developers, with support for OTEL-enabled observability platforms and deployment modes such as Terraform and Cloud Formation.